SB20240620226 - Improper error handling in Linux kernel x86 lib
Published: June 20, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper error handling (CVE-ID: CVE-2024-26674)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the SYM_CODE_START_LOCAL() function in arch/x86/lib/putuser.S, within the SYM_CODE_END() function in arch/x86/lib/getuser.S. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/2aed1b6c33afd8599d01c6532bbecb829480a674
- https://git.kernel.org/stable/c/2da241c5ed78d0978228a1150735539fe1a60eca
- https://git.kernel.org/stable/c/8eed4e00a370b37b4e5985ed983dccedd555ea9d
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.17
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.5
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8